Follow
Robert Abercrombie
Robert Abercrombie
Prime Time Computing, LLC
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6, 269-281, 2010
742010
A methodology to evaluate agent oriented software engineering techniques
CE Lin, KM Kavi, FT Sheldon, KM Daley, RK Abercrombie
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
712007
IoT intrusion detection taxonomy, reference architecture, and analyses
K Albulayhi, AA Smadi, FT Sheldon, RK Abercrombie
Sensors 21 (19), 6432, 2021
612021
A study of scientometric methods to identify emerging technologies via modeling of milestones
RK Abercrombie, AW Udoeyop, BG Schlicher
Scientometrics 91 (2), 327-342, 2012
502012
Methodology for evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
452009
Defining and computing a value based cyber-security measure
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-9, 2011
392011
Cyberspace security system
RK Abercrombie, FT Sheldon, EM Ferragut
US Patent 8,762,188, 2014
382014
Method and system for determining a volume of an object from two-dimensional images
RK Abercrombie, BG Schlicher
US Patent 7,773,773, 2010
382010
Risk assessment for industrial control systems quantifying availability using mean failure cost (MFC)
Q Chen, RK Abercrombie, FT Sheldon
Journal of Artificial Intelligence and Soft Computing Research 5 (3), 205-220, 2015
362015
System and method for identifying, validating, weighing and characterizing moving or stationary vehicles and cargo
DL Beshears, SG Batsell, RK Abercrombie, MB Scudiere, CP White
US Patent 7,305,324, 2007
342007
Risk assessment methodology based on the NISTIR 7628 guidelines
RK Abercrombie, FT Sheldon, KR Hauser, MW Lantz, A Mili
2013 46th Hawaii International Conference on System Sciences, 1802-1811, 2013
332013
Evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
302008
Security management of cyber physical control systems using NIST SP 800-82r2
AA Jillepalli, FT Sheldon, DC de Leon, M Haney, RK Abercrombie
2017 13th International Wireless Communications and Mobile Computing …, 2017
292017
Managing complex IT security processes with value based measures
RK Abercrombie, FT Sheldon, A Mili
2009 IEEE Symposium on Computational Intelligence in Cyber Security, 69-75, 2009
232009
OPNET/simulink based testbed for disturbance detection in the smart grid
MAH Sadi, MH Ali, D Dasgupta, RK Abercrombie
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
222015
Synopsis of evaluating security controls based on key performance indicators and stakeholder mission value
RK Abercrombie, FT Sheldon, A Mili
2008 11th IEEE High Assurance Systems Engineering Symposium, 479-482, 2008
202008
System and method for implementing and monitoring a cyberspace security econometrics system and other complex systems
RK Abercrombie, FT Sheldon, A Mili
US Patent App. 12/421,933, 2009
182009
Co-simulation platform for characterizing cyber attacks in cyber physical systems
MAH Sadi, MH Ali, D Dasgupta, RK Abercrombie, S Kher
2015 IEEE Symposium Series on Computational Intelligence, 1244-1251, 2015
172015
A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance-Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis …
RK Abercrombie, FT Sheldon, MR Grimaila
2010 IEEE Second International Conference on Social Computing, 1153-1158, 2010
162010
Quantifying security threats and their impact.
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
CSIIRW 9, 2009
152009
The system can't perform the operation now. Try again later.
Articles 1–20